πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
ATENTIONβ€Ό New - CVE-2016-6499

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2016-6498

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
❌ Jack Daniels, Ritz London Face Cyberattacks ❌

The REvil ransomware and savvy phone scammers have exposed sensitive information.

πŸ“– Read

via "Threatpost".
πŸ•΄ Should I Segment my IoT Devices Onto Their Own Networks? πŸ•΄

Understanding the criticality and importance of the device determines the level of segmentation.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ REvil Ransomware Hits Jack Daniel's Manufacturer πŸ•΄

Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.

πŸ“– Read

via "Dark Reading: ".
❌ β€˜EmoCrash’ Exploit Stoppered Emotet For 6 Months ❌

A researcher developed a killswitch exploiting a buffer overflow in Emotet - preventing the malware from infecting systems for six months.

πŸ“– Read

via "Threatpost".
πŸ•΄ Cybersecurity Companies Among Smaller Firms Hit with Brand Spoofing πŸ•΄

Researchers find smaller organizations, including some in the cybersecurity space, increasingly targeted with these impersonation attacks.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 decentralized platforms πŸ”

Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Top 5 decentralized platforms πŸ”

Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Reported Breach Count for H1 2020 Lowest in Five Years πŸ•΄

While reported breach numbers are down, a handful of "mega" breaches resulted in more data records being exposed than ever before, analysis shows.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Advent Completes Forescout Purchase πŸ•΄

The purchase by a private equity fund was announced in February and completed today.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Firms Still Struggle to Prioritize Security Vulnerabilities πŸ•΄

Security debt continues to pile up, with 42% of organizations attributing remediation backlogs to a breach, a new study shows.

πŸ“– Read

via "Dark Reading: ".
πŸ” Top 5 password hygiene security protocols companies should follow πŸ”

Proper password methodologies can be a challenge to master. Learn some tips from industry experts on how to streamline the process and safeguard your organization.

πŸ“– Read

via "Security on TechRepublic".
❌ IcedID Trojan Rebooted with New Evasive Tactics ❌

Juniper identifies phishing campaign targeting business customers with malware using password protection, among other techniques, to avoid detection.

πŸ“– Read

via "Threatpost".
πŸ” Carnival Cruises hit with a costly ransomware attack πŸ”

The company says in SEC filing it is preparing for potential claims from guests, employees, and shareholders based on the data accessed.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Why Quality & Security Both Matter in Software πŸ•΄

It's time to position quality and security as equals under the metric of software integrity.

πŸ“– Read

via "Dark Reading: ".
❌ AWS Cryptojacking Worm Spreads Through the Cloud ❌

The malware harvests AWS credentials and installs Monero cryptominers.

πŸ“– Read

via "Threatpost".
πŸ•΄ How to Stay Secure on GitHub πŸ•΄

GitHub, used badly, can be a source of more vulnerabilities than successful collaborations. Here are ways to keep your development team from getting burned on GitHub.

πŸ“– Read

via "Dark Reading: ".
πŸ” What is CISM? πŸ”

CISM (Certified Information Security Manager) is an advanced certification designed for IT professionals who focus on information security management. In this post, we’ll discuss what CISM is, the CISM certification process, and the benefits of being CISM-certified.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” How to customize PowerShell settings using profiles πŸ”

Learn to create profiles within PowerShell to customize your settings based on your working environment for optimal performance and efficiency.

πŸ“– Read

via "Security on TechRepublic".
πŸ›  UFONet 1.6 πŸ› 

UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc.

πŸ“– Go!

via "Security Tool Files β‰ˆ Packet Storm".